Explain the first vulnerability of choice in the OWASP Top 10.(such as pick an OWASP Top 10 vulnerability, Then why it exists, how it works and what code it effects) good marks will be awarded for correct identification of code that has been explained and annotated correctly as well as referenced using Harvard referencing.20% Using real-world code that you have researched or developed, mitigate the issue selected(such as linking the code from the first part of this question) Show your test environment (or what you think it might looklike), fixing the code and show threats have been mitigated correctly with examples. Lower marks will be awarded for just theory-based work. Annotations are also required for the code as well as referenced using Harvard referencing.10% Explain the second vulnerability of choice in the OWASP Top 10.(such as pick an OWASP Top 10 vulnerability, Then why it exists, how it works and what code it effects) good marks will be awarded for correct identification of code that has been explained and annotated correctly as well as referenced using Harvard referencing.20% Using real-world code that you have researched or developed, mitigate the issue selected(such as linking the code from the first part of this question), Show your test environment (or whatyou think it might look like), fixing the code and show threats have been mitigated correctly with examples. Lower marks will be awarded for just theory-based work